Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
ALog ConVerter and ALog ConVerter DB systematize the collection and examination of access logs to gather significant data. Utilizing patented translation technology, an extensive array of data access records is extracted from intricate system logs and synthesized into a comprehensible "access log" through a one-of-a-kind log analysis and conversion approach. The system automatically learns about each user's file access frequency and destinations. It assigns risk scores to any unusual activities, thereby uncovering potential fraud and attacks. By pre-setting alerts and reports, such as monitoring access to critical folders, users can enhance the efficiency of periodic audits and monitoring efforts. Furthermore, it enables the tracking of suspicious activities from multiple angles, including users who frequently fail login attempts and those who repeatedly delete files, ensuring comprehensive oversight. This proactive monitoring strategy fosters a more secure environment by identifying threats before they escalate.
Description
Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
API Access
Has API
API Access
Has API
Integrations
Alyvix
Amazon Simple Notification Service (SNS)
Amazon Web Services (AWS)
Asterisk
Azure Monitor
BackBox
Cloud Foundry
Google Cloud Storage
Jenkins
Kubernetes
Integrations
Alyvix
Amazon Simple Notification Service (SNS)
Amazon Web Services (AWS)
Asterisk
Azure Monitor
BackBox
Cloud Foundry
Google Cloud Storage
Jenkins
Kubernetes
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
AMIYA
Founded
1996
Country
Japan
Website
amiya.co.jp/solutions/alog_converter/
Vendor Details
Company Name
Centreon
Founded
2005
Country
France
Website
www.centreon.com/en/platform/
Product Features
Log Management
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
Product Features
Database Monitoring
Anomaly Detection
Autodiscovery
Capacity Planning
Dashboard
Dependency Tracking
Historical Trend Analysis
Multitenancy
Notifications / Alerts
Performance Monitoring
Permissions / Access Controls
Predictive Analytics
Prioritization
Query Analysis
Resource Optimization
Troubleshooting
IT Alerting
Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications
IT Infrastructure Monitoring
Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring
Log Management
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
RMM
Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management
Website Monitoring
Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting